Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


How are we getting infected!

  • Please log in to reply
2 replies to this topic

#1 wilric


  • Members
  • 35 posts
  • Local time:04:43 AM

Posted 10 October 2008 - 10:59 AM

We have approximately 30 computers in our buinses all connected to the internet and our network. We are running Symantec Enterprise as our main virus protection. One of the office computers got infected with Trojan-Spy Win32. MX :flowers: and we ran your suggested fix and it worked, Thanks for that advice. :thumbsup: What the owners are concerned about now is how do we actually get infected. Is it coming from downloads, email or simple browsing or some other way. We are also concerned that if it gets into a workstation, that it may then work its way through the entire network and or server. Thanks for your hard work


BC AdBot (Login to Remove)


#2 E-Mu


    Bleepin' Psychopomp

  • Members
  • 1,386 posts
  • Gender:Male
  • Location:UK
  • Local time:11:43 AM

Posted 10 October 2008 - 12:38 PM


Seem so this is a business situation and you have a network/server set up going im going along the lines you have the relevant protection for protecting this.

Do employees using the terminals have access to download anything they want to? Obv this is the common way to become infected, but id hope the firewall & antivirus would detect this.
Also could have been transfered from a memory stick that someones plugged in, transfered a file over and bobs your uncles.

However looking at "Trojan-Spy Win32. MX" it appears to be a program installed rather than a file, im not sure if thats the case but if so could this be traced back through the network to find out who installed it --> might give some more insight.

Hope this helps in some way or other :thumbsup:


Edited by Emu1616, 10 October 2008 - 12:42 PM.

~ E-Mu ~

"Emu, You Moo, We All Moo for Emu!" <-- Thanks to Animal

"If at first you don't succeed; call it version 1.0"

#3 ruby1


    a forum member

  • Members
  • 2,375 posts
  • Local time:12:43 PM

Posted 10 October 2008 - 12:57 PM


we ran your suggested fix and it worked, Thanks for that advice

Curious, as this entry appears to be your first request on this forum, was that help given via a different profile on here?
Part of MY business environment involves networked computers protected via various layers OF protection; also each of us is monitored for our use OF the computers ( which are not our own )and our activity can be audited and if necessary we will be restricted as to sites etc visited;
Our system recently had to be completely shut down and disinfected due TO an infection, probably from an e mail that folks do so delight in sending ; if necessary the company you have should be able to audit back the workers activity and see who did what and when ; this is part OF being on a network and having the privilege OF using a business computer

my own profile itself got clobbered by a rogue program that another person had seen fit to download

I was surprised the network's 'permissions' allowed to BE downloaded :flowers:

the owners may well wish to place very strict usage ON their computers, you are there too work and NOT to do 'other things'
Do they allow Face Book to be accessed etc? and opening of personal email via eg yahoo , hotmail etc ?

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users